
Paul V. Kulik
Examiner (ID: 8515)
| Most Active Art Unit | 2307 |
| Art Unit(s) | 2776, 2177, 2307, 2771, 2777 |
| Total Applications | 657 |
| Issued Applications | 529 |
| Pending Applications | 25 |
| Abandoned Applications | 103 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 5004126
[patent_doc_number] => 20070201694
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2007-08-30
[patent_title] => 'PRIVACY MANAGEMENT IN IMAGING SYSTEM'
[patent_app_type] => utility
[patent_app_number] => 11/688571
[patent_app_country] => US
[patent_app_date] => 2007-03-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 16
[patent_figures_cnt] => 16
[patent_no_of_words] => 13528
[patent_no_of_claims] => 24
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0201/20070201694.pdf
[firstpage_image] =>[orig_patent_app_number] => 11688571
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/688571 | PRIVACY MANAGEMENT IN IMAGING SYSTEM | Mar 19, 2007 | Abandoned |
Array
(
[id] => 8594851
[patent_doc_number] => 08352734
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2013-01-08
[patent_title] => 'Method for updating the firmware of a security module'
[patent_app_type] => utility
[patent_app_number] => 11/656468
[patent_app_country] => US
[patent_app_date] => 2007-01-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 1
[patent_figures_cnt] => 1
[patent_no_of_words] => 3298
[patent_no_of_claims] => 7
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 412
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 11656468
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/656468 | Method for updating the firmware of a security module | Jan 22, 2007 | Issued |
Array
(
[id] => 8297587
[patent_doc_number] => 08225388
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2012-07-17
[patent_title] => 'Method and apparatus for authorizing the transfer of information'
[patent_app_type] => utility
[patent_app_number] => 11/625004
[patent_app_country] => US
[patent_app_date] => 2007-01-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 22
[patent_figures_cnt] => 24
[patent_no_of_words] => 7427
[patent_no_of_claims] => 5
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 318
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 11625004
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/625004 | Method and apparatus for authorizing the transfer of information | Jan 18, 2007 | Issued |
Array
(
[id] => 4869561
[patent_doc_number] => 20080148388
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2008-06-19
[patent_title] => 'Platform authentication via a transparent second factor'
[patent_app_type] => utility
[patent_app_number] => 11/586283
[patent_app_country] => US
[patent_app_date] => 2006-10-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 6602
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0148/20080148388.pdf
[firstpage_image] =>[orig_patent_app_number] => 11586283
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/586283 | Platform authentication via a transparent second factor | Oct 24, 2006 | Issued |
Array
(
[id] => 9695396
[patent_doc_number] => 08826024
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2014-09-02
[patent_title] => 'Trusted compliance operations inside secure computing boundaries'
[patent_app_type] => utility
[patent_app_number] => 11/584859
[patent_app_country] => US
[patent_app_date] => 2006-10-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 14
[patent_no_of_words] => 8455
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 135
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 11584859
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/584859 | Trusted compliance operations inside secure computing boundaries | Oct 22, 2006 | Issued |
Array
(
[id] => 9680877
[patent_doc_number] => 08819806
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2014-08-26
[patent_title] => 'Integrated data access'
[patent_app_type] => utility
[patent_app_number] => 11/584098
[patent_app_country] => US
[patent_app_date] => 2006-10-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 8
[patent_no_of_words] => 9818
[patent_no_of_claims] => 27
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 303
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 11584098
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/584098 | Integrated data access | Oct 19, 2006 | Issued |
Array
(
[id] => 4917614
[patent_doc_number] => 20080098215
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2008-04-24
[patent_title] => 'Tracking of resource utilization during cryptographic transformations'
[patent_app_type] => utility
[patent_app_number] => 11/584195
[patent_app_country] => US
[patent_app_date] => 2006-10-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 5453
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0098/20080098215.pdf
[firstpage_image] =>[orig_patent_app_number] => 11584195
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/584195 | Tracking of resource utilization during cryptographic transformations | Oct 19, 2006 | Issued |
Array
(
[id] => 9049513
[patent_doc_number] => 08544071
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2013-09-24
[patent_title] => 'Systems and methods for software application security management'
[patent_app_type] => utility
[patent_app_number] => 11/584773
[patent_app_country] => US
[patent_app_date] => 2006-10-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 12
[patent_no_of_words] => 7951
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 243
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 11584773
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/584773 | Systems and methods for software application security management | Oct 18, 2006 | Issued |
Array
(
[id] => 4917856
[patent_doc_number] => 20080098457
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2008-04-24
[patent_title] => 'Identity controlled data center'
[patent_app_type] => utility
[patent_app_number] => 11/583667
[patent_app_country] => US
[patent_app_date] => 2006-10-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 7407
[patent_no_of_claims] => 29
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0098/20080098457.pdf
[firstpage_image] =>[orig_patent_app_number] => 11583667
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/583667 | Identity controlled data center | Oct 18, 2006 | Issued |
Array
(
[id] => 4826664
[patent_doc_number] => 20080229406
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2008-09-18
[patent_title] => 'Method and apparatus for exclusively controlling a device in a home network'
[patent_app_type] => utility
[patent_app_number] => 11/583090
[patent_app_country] => US
[patent_app_date] => 2006-10-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 4864
[patent_no_of_claims] => 26
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0229/20080229406.pdf
[firstpage_image] =>[orig_patent_app_number] => 11583090
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/583090 | Method and apparatus for exclusively controlling a device in a home network | Oct 18, 2006 | Issued |
Array
(
[id] => 5108742
[patent_doc_number] => 20070067620
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2007-03-22
[patent_title] => 'Systems and methods for third-party authentication'
[patent_app_type] => utility
[patent_app_number] => 11/517129
[patent_app_country] => US
[patent_app_date] => 2006-09-06
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 8695
[patent_no_of_claims] => 27
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0067/20070067620.pdf
[firstpage_image] =>[orig_patent_app_number] => 11517129
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/517129 | Systems and methods for third-party authentication | Sep 5, 2006 | Abandoned |
Array
(
[id] => 4668956
[patent_doc_number] => 20080044016
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2008-02-21
[patent_title] => 'Detecting duplicate and near-duplicate files'
[patent_app_type] => utility
[patent_app_number] => 11/499260
[patent_app_country] => US
[patent_app_date] => 2006-08-04
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 8344
[patent_no_of_claims] => 29
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0044/20080044016.pdf
[firstpage_image] =>[orig_patent_app_number] => 11499260
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/499260 | Detecting duplicate and near-duplicate files | Aug 3, 2006 | Issued |
Array
(
[id] => 8546650
[patent_doc_number] => 08321953
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2012-11-27
[patent_title] => 'Secure storage device with offline code entry'
[patent_app_type] => utility
[patent_app_number] => 11/486799
[patent_app_country] => US
[patent_app_date] => 2006-07-14
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 5986
[patent_no_of_claims] => 35
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 127
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 11486799
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/486799 | Secure storage device with offline code entry | Jul 13, 2006 | Issued |
Array
(
[id] => 5833760
[patent_doc_number] => 20060245590
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2006-11-02
[patent_title] => 'Method of confirming a secure key exchange'
[patent_app_type] => utility
[patent_app_number] => 11/479747
[patent_app_country] => US
[patent_app_date] => 2006-06-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 5197
[patent_no_of_claims] => 12
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0245/20060245590.pdf
[firstpage_image] =>[orig_patent_app_number] => 11479747
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/479747 | Method of confirming a secure key exchange | Jun 29, 2006 | Abandoned |
Array
(
[id] => 5030011
[patent_doc_number] => 20070271458
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2007-11-22
[patent_title] => 'AUTHENTICATING A TAMPER-RESISTANT MODULE IN A BASE STATION ROUTER'
[patent_app_type] => utility
[patent_app_number] => 11/419626
[patent_app_country] => US
[patent_app_date] => 2006-05-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 5969
[patent_no_of_claims] => 24
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0271/20070271458.pdf
[firstpage_image] =>[orig_patent_app_number] => 11419626
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/419626 | AUTHENTICATING A TAMPER-RESISTANT MODULE IN A BASE STATION ROUTER | May 21, 2006 | Abandoned |
Array
(
[id] => 5015386
[patent_doc_number] => 20070258594
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2007-11-08
[patent_title] => 'SECURE LOGIN USING A MULTIFACTOR SPLIT ASYMMETRIC CRYPTO-KEY WITH PERSISTENT KEY SECURITY'
[patent_app_type] => utility
[patent_app_number] => 11/381878
[patent_app_country] => US
[patent_app_date] => 2006-05-05
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 15
[patent_figures_cnt] => 15
[patent_no_of_words] => 25309
[patent_no_of_claims] => 23
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0258/20070258594.pdf
[firstpage_image] =>[orig_patent_app_number] => 11381878
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/381878 | Secure login using a multifactor split asymmetric crypto-key with persistent key security | May 4, 2006 | Issued |
Array
(
[id] => 5255116
[patent_doc_number] => 20070136572
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2007-06-14
[patent_title] => 'Encrypting system to protect digital data and method thereof'
[patent_app_type] => utility
[patent_app_number] => 11/417112
[patent_app_country] => US
[patent_app_date] => 2006-05-04
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 2399
[patent_no_of_claims] => 10
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0136/20070136572.pdf
[firstpage_image] =>[orig_patent_app_number] => 11417112
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/417112 | Encrypting system to protect digital data and method thereof | May 3, 2006 | Abandoned |
Array
(
[id] => 4908742
[patent_doc_number] => 20080019508
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2008-01-24
[patent_title] => 'Public key cryptographic methods and systems with rebalancing'
[patent_app_type] => utility
[patent_app_number] => 11/416903
[patent_app_country] => US
[patent_app_date] => 2006-05-03
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 6143
[patent_no_of_claims] => 7
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0019/20080019508.pdf
[firstpage_image] =>[orig_patent_app_number] => 11416903
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/416903 | Public key cryptographic methods and systems with rebalancing | May 2, 2006 | Abandoned |
Array
(
[id] => 7803722
[patent_doc_number] => 08132006
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2012-03-06
[patent_title] => 'Cryptographic authentication and/or establishment of shared cryptographic keys, including, but not limited to, password authenticated key exchange (PAKE)'
[patent_app_type] => utility
[patent_app_number] => 11/415558
[patent_app_country] => US
[patent_app_date] => 2006-05-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 6
[patent_no_of_words] => 15661
[patent_no_of_claims] => 75
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 437
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] => patents/08/132/08132006.pdf
[firstpage_image] =>[orig_patent_app_number] => 11415558
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/415558 | Cryptographic authentication and/or establishment of shared cryptographic keys, including, but not limited to, password authenticated key exchange (PAKE) | Apr 30, 2006 | Issued |
Array
(
[id] => 5226699
[patent_doc_number] => 20070255966
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2007-11-01
[patent_title] => 'Cryptographic circuit with voltage-based tamper detection and response circuitry'
[patent_app_type] => utility
[patent_app_number] => 11/416005
[patent_app_country] => US
[patent_app_date] => 2006-05-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 2499
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0255/20070255966.pdf
[firstpage_image] =>[orig_patent_app_number] => 11416005
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/416005 | Cryptographic circuit with voltage-based tamper detection and response circuitry | Apr 30, 2006 | Abandoned |